Match each term with the correct statement below.

A. Involves the use of tickets that are exchanged between the client who requests logon and network services access, and the server or Active Directory that grants access.
B. A comprehensive set of security features that monitors and manages a server and its clients
C. A security specification for a hardware device that can be used to secure information on a different hardware device, such as a hard drive
D. Programs that you choose to allow through the firewall in both directions
E. Designed to keep the user running in the standard user mode as a way to more fully insulate the kernel and to keep operating system and desktop files stabilized
F. A portion of a network that is between two networks, such as between a private network and the Internet
G. A relatively new security measure for protecting hard drives
H. A wired and wireless authentication approach offered by the IEEE and is supported in modern Windows operating systems including Windows XP, Windows Vista, Windows 7, and Windows Server 2003/2008
I. An Active Directory object that contains group policy settings (a set of group policies) for a site, domain, OU, or local computer


A. kerberos security
B. NAP
C. TPM
D. exceptions
E. UAC
F. demilitarized zone
G. BitLocker Drive Encryption
H. 802.1X
I. GPO

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. STL set operations are essentially insert, delete, and the query, “Is it there?”. 2. A Map is a function given as a set of ordered pairs. The first is the key that has to have ordering and the second is any type. The position of a pair in the set is determined by the ordering on the keys. 3. The notation m["stringval"] = 100 is valid if m is a map that takes a pair of type (string, 4. The set container implements only iterator. 5. Order of magnitude estimates don’t work well if we are interested in behavior for small data sets.

Computer Science & Information Technology

Give a typedef statement that hides the pointer operator *. Call the new type identifier NodePtr.

Given the type definitions: ``` const int STRING_SIZE = 20; struct ListNode { char item[STRING_SIZE]; int count; ListNode *link; }; ListNode *head = new ListNode; ```

Computer Science & Information Technology

QWERTY and Dvorak are types of ________

A) monitors B) keyboards C) scanners D) printers

Computer Science & Information Technology

List the sections of a system design specification, and describe the contents.

What will be an ideal response?

Computer Science & Information Technology